+ All Categories
Home > Documents > VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS,...

VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS,...

Date post: 17-Dec-2015
Category:
Upload: sybil-cooper
View: 265 times
Download: 1 times
Share this document with a friend
Popular Tags:
13
VERITAS Confidential Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.
Transcript

VERITAS Confidential

Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.

VERITAS Confidential

High Availability

Leveraging Technology for Business Continuity and Corporate Security

VERITAS Confidential

Benefits

• Best Practice for Business Continuity

• Lowers Costs

• Reduces Security Risk

VERITAS Confidential

Customer Facing and Revenue Generating

• Just replicating the database is not enough• Can’t have a crippled website, customers need full

access• Manual restores ATOD no longer feasible for 24/7

“Even 99-percent uptime may still not be enough because customers expect around-the-clock access to systems and applications. With competition just a click away, businesses must ensure the continuous availability of their internal and customer-facing systems to succeed in today’s business world.”

Nigel Stokes, CEO, DataMirror

VERITAS Confidential

High Availability Essential for BC• Protects mission critical data and applications

• Reduces system downtime – Full restore = between 48 and 72 hours and several sys admin resources – High-availability solution = a switch-over and successful failover within 30

minutes.

• Effectively complies with mandated government regulations:– Basel II– Sarbanes-Oxley Act

• Minimize downtime and costs of planned and unplanned outages.– High-availability solutions allow IT staff to conduct scheduled maintenance

when required by performing a switchover that allows all internal and external-facing systems and applications to be temporarily housed on a backup server - end-users continue using the systems and applications they need and companies maintain business-as-usual operations

VERITAS Confidential

Manual Environments

Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more serversSource: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers

53%53% 24%24% 23%23%

54%54% 17%17% 29%29%

56%56% 17%17% 28%28%

58%58% 18%18% 24%24%

60%60% 16%16% 24%24%

62%62% 14%14% 25%25%

0%0% 10%10% 20%20% 30%30% 40%40% 50%50% 60%60% 70%70% 80%80% 90%90% 100%100%

Percent of ReponsesPercent of Reponses

Security MgmtSecurity Mgmt

NetworkNetwork

Event Event

Performance Performance

Storage Storage

Change/ConfigChange/Config

Degree of AutomationDegree of Automation

ManualManual ScriptsScripts Automated ToolsAutomated Tools

VERITAS Confidential

Highest Costs: Staff and Downtime

00

1010

2020

3030

4040

5050

6060

7070

Staff CostsStaff Costs DowntimeDowntime TrainingTraining SoftwareSoftware HardwareHardware

Source: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more serversSource: IDC 2002 Microsoft Primary Quantitative Research. 400 surveys, IT professionals in data centers, 25 or more servers

VERITAS Confidential

HA Best Practice Lowers Costs• Least Manual Method = Most Protection

– Decreasing these costs is biggest impact to your bottom line• 60% of 5 year total cost of ownership for IT systems are staff costs • Soft ‘costs savings’ of re-deploying staff to revenue generating

activities– HA architecture provides savings comprised of a 30% improvement in

server administration & 50% improvement in hardware costs– Large companies realize average cost savings of $30,000 an hour by

avoiding planned and unplanned downtime, using HA solutions• Clustered = Best Practice

• Incorporate previous equipment investments in storage and networks• Most cases a 20% - 30% reduction in annual total cost of IT operations

by consolidating servers, decreasing administration costs• Ability to rollout repeatable HA environments quickly and effectively,

improving service levels, reducing support and implementation costs• Standard methods for monitoring the health and status of the clusters• Integrated set of management tools and guidance equal improved

network and application up-time.Source: IDC 2003Source: IDC 2003

VERITAS Confidential

Security Risks

VERITAS Confidential

Security Risks

• Lack of coordination leads to wasted effort, miscommunication and ultimately environment gaps

• Not planning architecture at front end leaves you open to ad-hoc add-ons that pose inherent security risk

• Manual restore is reactive vs. proactive• Greater margin/opportunities for error

VERITAS Confidential

Standards = Resilience

Increase Operational Efficiency• Implementation strategy that does not impact production • Concurrent project plan for roll-out at Primary and DR

Data Centers

Enhance Change Management Mechanisms• DR Repository framework with ITIL and SDLC tie-ins to

the plan management process for updating your architecture and changes to production as you go through your development cycle

VERITAS Confidential

Recommended Reading

“Defeating Downtime in the 24/7 Business World”,

Nigel Stokes, DataMirror, Continuity Insights May/June 2004

“Never Failover on a Monday: Overcoming The Five Fatal Flaws of Traditional Replication Solutions”, MessageOne, Inc. White Paper 2005

“Managing the Impact of Downtime”, Dan Kusnetzky, IDC Study VERITAS Solutions 2005

VERITAS Confidential

Copyright © 2002 VERITAS Software Corporation. All Rights Reserved. VERITAS, VERITAS Software, the VERITAS logo, and all other VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation in the US and/or other countries. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.


Recommended